Sunday, 4 March 2018

internet,intranet and extranet

ADVANTAGE AND DISADVANTAGE


internet



intranet



extranet





computer security risk

Definition of computer security risk:

Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.

WHAT IS COMPUTER RISK
Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data.

Any illegal act involving a computer generally is referred to as a computer crime.
Cybercrime refers to online or Internet-based illegal acts.

Software used by cybercriminals sometimes is called crimeware.

Perpetrators of cybercrime and other intrusions fall into seven basic categories:
qHacker, refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.

qCracker also is someone who accesses a computer or network illegally but has the intent of. destroying data, stealing information, or other malicious action

qScript kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Often use prewritten hacking and cracking programs to break into computers.

qCorporate spies have excellent computer and networking skills.
ühired to break into a specific computer and steal its proprietary data and information.
üto help identify security risks in their own organization.













peer-to-peer and client server

Categories of network architecture

      -Peer-to-Peer network



          •A simple, inexpensive network that typically connects fewer  than 10 computers.
          •Each computer, called a peer, has equal responsibilities and capabilities.

         •Sharing hardware (such as a printer), data or information with other computers on the peer-to-peer network.

        •Each computer stores files on its own storage devices. Thus, each computer on the network contains both the server operating system and application software.
•All computers on the network share any peripheral device(s) attached to any computer

•Peer-to-peer networks are ideal for very small businesses and home users.

•Some operating systems, such as Windows, include a peer to-peer networking utility that allows users to set up a peer-to-peer network.


Implementing a peer-to-peer network typically involves three steps:
•Install network hardware.
•Configure the peers and workgroup members.
•Share resources to the network.







client/server network

One or more computers act as a server, and the other computers on the network request services from the server.

Server, sometimes called a host computer, controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data and information.

The clients are other computers and mobile devices on the network that rely on the server for its resources.
For example, a server might store a database of customers. Clients on the network (company employees) access the customer database on the server.

Client/server architecture works when the client computer sends a resource or process request to the server over the network connection, which is then processed and delivered to the client.

A server can manage several clients simultaneously, whereas one client can be connected to several servers at a time, each providing a different set of services.

The Internet is also based on client/server architecture where the Web server serves many simultaneous users with Web page and or website data.




bus,ring and star topology

bus,ring and star topology



Ring topology:

Network topologies - a RING networkIn a ring topology, the nodes are connected in a ring and data travels in one direction using a control signal called a 'token'.
Advantages:
  • Not greatly affected by adding further nodes or heavy network traffic as only the node with the 'token' can transmit data so there are no data collisions.
  • Relatively cheap to install and expand.
Disadvantages:
  • Slower than a star topology under normal load.
  • If the cable fails anywhere in the ring then the whole network will fail.
  • If any node fails then the token cannot be passed around the ring any longer so the whole network fails..
  • The hardest topology to troubleshoot because it can be hard to track down where in the ring the failure has occurred.
  • Harder to modify or expand because to add or remove a node you must shut down the network temporarily.
  • In order for the nodes to communicate with each other they must all be switched on.

Bus (line) topology:

Network topologies - a BUS (LINE) networkNodes are connected to a main (bus) cable. If data is being sent sent between nodes then other nodes cannot transmit.  If too many nodes are connected then the transfer of data slows dramatically as the nodes have to wait longer for the bus to be clear.
Advantages:
  • The simplest and cheapest to install and extend.
  • Well suited for temporary networks with not many nodes.
  • Very flexible as nodes can be attached or detached without disturbing the rest of the network.
  • Failure of one node does not affect the rest of the bus network.
  • Simpler than a ring topology to troubleshoot if there is a cable failure because sections can be isolated and tested independently.
Disadvantages:
  • If the bus cable fails then the whole network will fail.
  • Performance of the network slows down rapidly with more nodes or heavy network traffic.
  • The bus cable has a limited length and must be terminated properly at both ends to prevent reflected signals.
  • Slower than a ring network as data cannot be transmitted while the bus is in use by other nodes.

Star topology:

Network topologies - a STAR networkIn this type of network, a central computer (server) usually forms the main node and the subsidiary nodes are connected to it and to each other through a switch or hub.
Advantages:
  • The most reliable because the failure of a node or a node cable does not affect other nodes.
  • Simple to troubleshoot because only one node is affected by a cable break between the switch and the node.
  • Adding further nodes does not greatly affect performance because the data does not pass through unnecessary nodes.
  • Easily upgraded from a hub to a switch or with with a higher performance switch.
  • Easy to install and to expand with extra nodes.
Disadvantages:
  • Uses the most cable which makes it more expensive to install than the other two topologies.
  • The extra hardware required such as hubs or switches further increases the cost.
  • As the central computer controls the whole system, the whole system will be affected if it breaks down or if the cable link between it and the switch fails.
  • If the switch, the link to the server or the server itself fails then the whole network fails.

Sunday, 25 February 2018

RULES OF NETIQUETTE & AREAS OF COMPUTER ETHICS

Rules Of Netiquette











Areas Of Computer Ethics
Information accuracy




One of the concern because many users access information maintained by   other people or companies, such as on the Internet.

Do not assume all the information on the Web is correct 

Users should evaluate the value of a Web page before relying on its content.

Be aware that the organization providing access to the information may not be the creator of the information.







Green computing


  •      Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact.



green computing tips





1. Buy "Energy Star" labeled monitors, desktops, laptops, and printers . The "Energy Star" devices can be programmed to "power-down" to a low power state when they are not in use, helping you save energy and run cooler which helps them last even longer. The Energy Star specification for computers was revised on October 20, 2006 and goes into effect July 20, 2007. The specification includes new performance requirements to qualify for the Energy Star rating for desktop and notebook computers, workstations, integrated computers, desktop-derived servers and game consoles. Now you can feel good about that upgrade!
2. Put laptops in "sleep" mode when not in use. The EPA has estimated that this reduces their energy use by 60 to 70 percent – and ultimately could save enough electricity each year to power Vermont, New Hampshire, and Maine, cut electric bills by $2 billion, and reduce carbon dioxide emissions by the equivalent of 5 million cars.
3. Even better, turn OFF computers and other equipment when not in use. Despite the debate over whether it's better for your computer to be left on or shut off, the fact is it's better for the environment to shut it off. Trust me, your computer can handle it just fine; in fact, computers were designed to be turned off and back on!
4. E-cycle used computer equipment. Find a recycler in your area. Also, Staples, the office supply retailer, has now started a recycling program. They will accept any brands of used desktop and notebook computers, monitors, printers, fax machines and all-in-one devices with a fee of $10. Smaller items like keyboards, mice and speakers are free to drop off.
5. Buy the new "Smart Strip" power strip. The Smart Strip actually senses how much power your computer peripherals use. And when the Smart Strip senses that you've turned your computer off, it automatically shuts off your peripherals, too, preventing them from drawing an idle current, which is the current drawn even after equipment is shut off. 



Codes of conduct

Written guideline that helps determine whether a specific action is ethical/unethical or allowed/not allowed





Intellectual property -click this 



Information privacy

The right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.














internet,intranet and extranet

ADVANTAGE AND DISADVANTAGE internet intranet extranet